1. Awrangjeb M, Kankanhalli MS (2005, Mar) Reversible watermarking usinga perceptual model. J Electron Imag 14:013014
2. Cox J, Kilian J, Leighton FT, Shamoon T (1997, December) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
3. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2008) Digital watermarking and steganography, vol. 1. 2 edition. Burlington, USA. https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ved=0ahUKEwiY8p3kyNDUAhURS48KHXrECwsQFggxMAE&url=https%3A%2F%2Fwww.researchgate.net%2Ffile.PostFileLoader.html%3Fid%3D54e44898f15bc7951c8b45c7%26assetKey%3DAS%253A273705148583969%25401442267800828&usg=AFQjCNE2c85tt60fZufUaXHUPCb4mG_8pQ
4. Fridrich J, Goljan M, Du R (2001, Jan) Invertible authentication. In Proc. SPIE Photonics West, Security and Watermarking of Multimedia Contents III, vol. 3971, San Jose, pp 197–208
5. Fridrich J, Goljan M, Du R (Feb. 2002) Lossless data embedding—new paradigm in digital watermarking. EURASIP J Appl Signal Processing 2002(2):185–196